Evaluation Assurance Level
ISC2 Code of ethics canons
Optimising Traffic Capacity In an Age of Terabit DDoS Attacks
Optimising Traffic Capacity In an Age of Terabit DDoS Attacks [1]. The exponential growth in both hardware and software marvelling engineering crafts has opened new opportunities for both consumer and enterprise industry. On the cross roads of offered services and demand, it is crucial for business to focus in an entirely new way to look … More Optimising Traffic Capacity In an Age of Terabit DDoS Attacks
Arbor Helpful Hacks
BGP Flowspec Configuration for Juniper MX
Reference to the last article for more reference is here. In this example we assume that the Arbor SP Collector Appliance is 10.100.200.10 and the specific Juniper device is 10.1.2.3 with a configured community 1234:5678 for RTBH purposes. Step1: Create a FlowSpec policy allowing Arbor SP Collector IP Address set policy-options policy-statement ARBOR_FS_POLICY from neighbor … More BGP Flowspec Configuration for Juniper MX
BGP Flowspec Configuration for ASRs
Recently i worked on BGP Flowspec based attack mitigation using Arbor SP. This post will delineate the key findings and configuration experience to help others in doing a similar deployment. Arbor SP [1] is the Visibility and Attack Detection Engine, which runs on a hypervisor layer such as Cisco UCS. The job of Arbor SP is … More BGP Flowspec Configuration for ASRs
Example Network Attacks
Following are some example TCP/UDP Attack we can do from a Linux system for testing purposes. TCP SYN and FIN hping3 10.247.225.134 -a 60.1.1.1 -p 80 -SF -i u1000 (ip anomaly check) Done. TCP ACK and RST Floods (ACK) hping3 10.247.225.134 -a 60.1.1.2 -s 10005 -p 80 -P -A -k -i u1000 -d 60 (out-of-seq … More Example Network Attacks
IPSec VPN Configuration
FACT SHEET – VPN IPSEC (Cisco based) Understanding VPN components – IPSec and encryption (data integrity) Defining a VPN Understanding the need for encryption Types of encryption VPN benefits Cheaper connections Available anywhere Heavily encrypted and secure Many to many connection The world of IPSec Authentication Data Integrity Confidentiality Anti-Replay IPSec components Negotiation protocol – … More IPSec VPN Configuration